MIS 180 Barra In Person Exam 2 (FINAL) Study Guide 2024

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/85

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

86 Terms

1
New cards

What is the difference between LAN and WAN?

LAN - Local area, telephone lines, one company

WAN - large geographic area, satellites, owned by multiple companies

2
New cards

Is an IntrAnet a LAN or WAN?

A type of LAN

3
New cards

What is an ISP?

Internet Service Provider

4
New cards

What protocol does the IEEE manage? What other name does it go by?

WiFi

Marketed as WiFi6

5
New cards

What devices are the 4G, 5G protocols used for?

Mobile devices

6
New cards

How do we measure data transmission speed?

Bandwidth, using bits (b), mbps

7
New cards

How is data storage capacity measured?

Bytes (B)

8
New cards

What does bandwidth mean?

The max amount of data that can be transmitted over a channel per unit of time

9
New cards

From fastest to slowest, rank bandwidth of:

Bluetooth, WiFi, Ethernet

Ethernet

WiFi

Bluetooth

10
New cards

What does TCP stand for?

Transmission Control Protocol

11
New cards

What does TCP do?

Breaks data into packets and rebuilds them at receiving end

12
New cards

What does IP stand for?

Internet Protocol

13
New cards

What does IP do?

Routes the data, provides addresses

14
New cards

What are TCP and IP considered to be?

The foundation of the internet

15
New cards

What is the network protocol for the Web?

HTTP

16
New cards

What is the internet?

A collection of computer around the world that agree to speak the same language

17
New cards

What is the intrAnet?

Open and secure, internal networks that use internet and are accessible through web browsers

Has a firewall

18
New cards

What is the extranet?

Connect a company's resources with external organizations such as customers and suppliers

Utilize a VPN and a firewall

19
New cards

What is packet switching?

The path of a signal that is broken into smaller parts

20
New cards

What is a packet? What is the approximate storage capacity?

A type of information storage used to transmit data

About 1000 bytes

21
New cards

What routes do individual packet travel on the internet?

Uses IP address to traverse the internet

22
New cards

How is circuit switching different from packet switching?

Circuit - physical

Packet - digital

23
New cards

What is the IETF and what does it do for the internet?

Internet Engineering Task Force

Guides TCP/IP standards

24
New cards

What is the W3 Consortium and what does it do for the internet?

World Wide Web Cons.

Guides web standards

25
New cards

What is the EFF and what does it do for the internet?

Electronic Frontier Foundation

Guides social use issues, government regulations, and legal regulations (FCC - Federal communications commission)

26
New cards

What is a business process?

a network of activities for accomplishing a business function

27
New cards

What are the 6 basic questions business professionals ask to improve a business process?

- What countries do we want?

- What inputs can we get?

- What processes will we use and manage?

- What feedback loops will we use?

- What decisions and rules will we use?

- How do we measure improvement?

28
New cards

What 4 ways might a business process be "bad"?

- Takes too long

- Costs too much

- Produces low quality

- Wastes resources

29
New cards

What is a KPI in process analysis?

A metric used to evaluate progress towards a goal

30
New cards

What is a baseline KPI?

A metric used to evaluate progress towards a goal at a specific point in time

31
New cards

What value does does a KPI have in process improvement?

Quantifiable measure to track progress, identify areas for improvement, and demonstrate the effectiveness of changes

32
New cards

What are the causes of "bad" business processes?

- Poor data

- poor decision making process

- the design is flawed

- human problems

- technology problems

- business functions may be siloed

33
New cards

What does "business processes are siloed" mean?

Different parts of the company (operations, marketing, sales, etc) fail to work together efficiently

34
New cards

What is the difference between incremental and radical improvement?

Incremental - marginal % better, rarely improves competitive advantage

Radical - significant % better, typically improves competitive advantage

35
New cards

How do enterprises do process improvement with computer technology? What are the methods?

1. understand capabilities of IT

2. conduct GAP analysis

3. Invest in enterprise applications

------- OR ---------

BPR

36
New cards

What is BPR?

Business process reengineering

A radical organizational change process that aims to reduce cycle times dramatically

37
New cards

What is an external threat to a system? Provide an example

Outside the organization

Legal, natural disasters, criminals

38
New cards

What is an internal threat to a system? Provide and example

Within the organization

Policies not followed, malicious employees

39
New cards

Name the 3 levels of system security

Perimeter, Prevention, Monitoring

40
New cards

List some common security threats

Malware - malicious software

Ransomware - malware that requires payment to be cleared

Social engineering (phishing) - a falsified document that looks like a familiar application

Spyware - malware that tracks information

41
New cards

What is a hacker?

A person with know-how that uses it to break into computers

42
New cards

What is the difference between a black hat and white hat hacker?

Black hat - A "bad guy", malicious intent

White hat - A "good guy", used to stress test security systems, highlight flaws

43
New cards

Name the parts of the prevention checklist - NETWORK layer

Firewall

VPN

Deny hacks/phishing/fraud

44
New cards

Name the parts of the prevention checklist - APPLICATION layer

Password manager

AntiVirus software

AntiSpyware software

Camera block

Browser filters

Download practices

45
New cards

Name the parts of the prevention checklist - DATA layer

OS updates

Backup practices

Physical protection

Disconnect your device

Insurance

46
New cards

What are 2 ways to back-up your data?

Cloud

Hard drive

47
New cards

What is encryption?

Creates a code that only the sending and receiving device can understand

Ex: Every 4th letter = that letter +/- 3 letters

48
New cards

What is a firewall?

A computer or router that controls access in or out of the organization's networks

49
New cards

Authentication vs authroization

Authentication - a method for confirming identities

Authorization - the process of giving someone permission to do or have something

50
New cards

What is the dilemma we face as business professionals in dealing with the handling of personal information?

We want to know everything about our customers so we can sell/serve them better

51
New cards

What is the takeaway about how the world views ethical or high integrity behavior

More ethical (higher integrity/less corrupt) countries get more foreign investment

52
New cards

What is a data broker? How do they get your personal information?

Companies that collect and sell personal information obtained through a variety of tracking sources (public records, web scraping, software)

53
New cards

Difference between morals, ethics, laws?

Moral - codes of conduct governing behavior based on values

Ethics - an examination of the moral basis on human behavior and attempts to determine the best course of action in the face of conflicting choices

Laws - Rules as established by a governing body

54
New cards

What are the guiding principles of information ethics

Personal benefit, social benefit, benevolence, paternalism, harm, honesty, lawfulness, autonomy, justice, rights

55
New cards

What is personal informaition?

Personal subjects like health conditions, finances, lifestyle

56
New cards

What is intellectual property?

Patents, trademarks, trade secrets, formulas, copyright

Provides ownership to a thing

57
New cards

What does copyright law protect?

Reproduction, modification, distribution, public performance, public display, digital transmission

58
New cards

What are the 4 parts of the "Fair Use" exception in copyright law?

Noncommercial (money making), factual, insubstantial amount used, does not effect market value

59
New cards

What is a project?

A plan that has a definitive starting and ending

60
New cards

What is a process?

A plan that has a long term, undefined timeline, typically with set goals and flexible deadlines

61
New cards

What % of projects are successful?

What % are challenged?

What % are failed?

32%

24%

44%

62
New cards

What is scope in project management?

Functionality and features that the project will include.

63
New cards

What is scope creep?

When scope grows while budget and schedule do not.

64
New cards

What are milestones in project management?

Points in time at which a task is done.

65
New cards

What does a PERT chart represent?

Task dependencies and time sequencing.

66
New cards

What does a Gantt chart show?

Who owns and executes each task.

67
New cards

In a PERT chart, what is critical path and slack?

Critical path - the longest path that is required to complete a project

Slack - time in between the start and the finish

68
New cards

In what 3 ways do systems development projects often fail?

Scheduling

Budget

Functionality

69
New cards

What is a SDLC (systems development cycle) and why do companies use them?

It is an approach to building systems

It gets the company exactly what they need; set goals and timelines

70
New cards

In the IS lifecycle, why do Costs and Benefits curves converge over time?

Because systems eventually become irrelevant or expensive to maintain

71
New cards

What is the waterfall model? Why is it advantageous?

Linear (steps), faster if you know the end goal

Easier to understand, not the best for feedback and learning

72
New cards

What is the Agile model? Why is it advantageous?

Has iterations (iterative), good for innovative results, specifically designed for feedback

Harder to understand

73
New cards

What is the organizational aspect of feasibility analysis?

Will the organization use the system?

74
New cards

What is the technical aspect of feasibility analysis?

Is the technology available and easy to use?

75
New cards

What is the economic aspect of feasibility analysis?

Is the cost/benefit sufficient?

76
New cards

What is the security aspect of feasibility analysis?

How well will the system protect our data and applications?

77
New cards

What is the legal aspect of feasibility analysis?

Does it violate laws or regulations?

78
New cards

What is the schedule aspect of feasibility analysis?

Can we get the system into production soon enough?

79
New cards

What is the KPI aspect of feasibility analysis?

Does the project help reach KPIs?

80
New cards

What is a Discriminative AI Model? Outputs?

Trained to classify or predict information

Ex: Identify a picture of a lamp post

Output: Numbers, classification, probability

81
New cards

What is a Generative AI Model? Outputs?

Generates new data instances based on learned probability distribution of existing data you fed it

Output: Natural language, images, audio

82
New cards

How does traditional AI differ from how AI learns?

Trad: exact definitions are coded in, cannot adapt

Gen: Learns via existing content, creates a model that is used in prediction

83
New cards

What is the process of AI learning called?

Training

84
New cards

What are computer hallucinations and why might they occur?

Nonsensical words or phrases generated by AI

Due to lack of volume of data or lack of quality of data

85
New cards

What are prompts?

A piece of text that is used to control a model

86
New cards

What is prompt design?

Process of creating a prompt that will generate a desired output